WorldCat Linked Data Explorer

http://worldcat.org/entity/work/id/866282519

Virtualization for security including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting

One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, including sandboxing, disaster recovery and high availability, forensic analysis, and honeypotting.

Open All Close All

http://schema.org/about

http://schema.org/description

  • "One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, including sandboxing, disaster recovery and high availability, forensic analysis, and honeypotting."@en
  • "One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, including sandboxing, disaster recovery and high availability, forensic analysis, and honeypotting."
  • "The only book to combine in one place all the hot virtualization applications security professionals are searching for!"@en
  • "One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, including sandboxing, disaster recovery and high availability, forensic analysis, and honeypotting"
  • "One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place these most important and sought-after uses of virtualization for enhanced security. Already gaining buzz and traction in actual usage at an impressive rate, Gartner research indicates that virtualization will be the most significant trend in IT infrastructure and operations over the next four years. With this growth in adoption, security is becoming a much more serious concern. This book provides security professionals with the virtualization tools they?ll need to function effectively and efficiently in this game-changing landscape. Tactics include isolating a virtual environment on the desktop for application testing, creating virtualized storage solutions for immediate disaster recovery and high availability across a network, migrating physical systems to virtual systems for analysis, and creating complete virtual systems to entice hackers and expose potential threats to actual production systems."

http://schema.org/genre

  • "Llibres electrònics"
  • "Electronic books"@en
  • "Electronic books"

http://schema.org/name

  • "Virtualization for Security"
  • "Virtualization for security : including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting ; [the only book on all the security applications made possible by virtualization ; comprehensive coverage of the many uses of virtualization technology for an enhanced security posture ; broad technique-based approach useful for every security professional, from administrators and researchers to consultants and forensic investigators ; covers many virtualization options, including choosing the right solution for the task, configuration, and use in dual booting, training and protection]"
  • "Virtualization for security : including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting / technical editor John Hoopes ; [aut.] Aaron Bawcom [et al.]"
  • "Virtualization for security : including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting"
  • "Virtualization for security including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting"@en
  • "Virtualization for security including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting"
  • "Virtualization for Security Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting"@en